CONCERTIUM BLOG

10 Ransomware Defense Strategies to Deploy in 2023

10 Ransomware Defense Strategies to Deploy in 2023

Ransomware attacks have advanced significantly since the first reported incident more than 30 years ago. As today's attackers utilize more sophisticated delivery methods and leverage readily available malware to target vulnerable organizations for financial gain, it's...

read more
Ransomware Trends to Watch in 2023

Ransomware Trends to Watch in 2023

Ransomware attacks continue to grow in sophistication and effectiveness. The reported incidents in 2022 were much more damaging and costly to address than ever before. According to IBM’s data breach report for 2022, the share of breaches caused by ransomware increased...

read more
From cost center to cost mitigation

From cost center to cost mitigation

What's the biggest thing holding you back from making cybersecurity a priority? For most CISOs and security executives, it's the fact that cybersecurity is perceived as a cost center rather than part of an overall cost mitigation strategy. Cost Center Mentality...

read more
Suddenly CISO Series: Avoiding the post-merger hangover

Suddenly CISO Series: Avoiding the post-merger hangover

Mergers and acquisitions create huge growth opportunities — but, as with any good thing, they come with transition challenges, especially in security. Pre-merger planning activities are often focused within strategic, operational, and legal teams, while other groups...

read more